• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.022 seconds

A Study on the Improvement of Passenger Ship Rudder Stock and Tiller Locking Nut Loosening by Analyzing an Investigation Report and the NAS 3350 Test (조타장치 사고 재결서 분석과 NAS 3350 시험을 통한 카페리 여객선 타두재와 틸러 체결 너트 풀림 개선에 관한 연구)

  • Kang, Dae-Kon;Kim, Shin Hyo;Park, Jai-Hak
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.2
    • /
    • pp.253-259
    • /
    • 2018
  • In February 2014, the rudder upper stock and the nut of a passenger ship were released and an accident occurred. That accident occurred because the steering gear of passenger ships that was intended to move many passengers. The accidents due to steering gear was zero according to 2010-2016 statistics. There is no rules prevent loosening of the upper rudder nut in "Ship Safety Act" and "Structural standard of steel ship". Since the accident, the Korea register has been revised to the joining method in Part 5 Chapter 7 of the rules in the classification of steel ships. In the field survey of 12 passenger ships operating on Mokpo and surrounding islands, the welding method was applied in the cases as the fastening method. The fastening type was equipped with two C-type structures. It was structured to be difficult to access. The NAS 3350 test was conducted to investigate ways to prevent homologous accident considering the characteristic of passenger ships that need to lift or unload rides once a year.

Linkage the Development Strategy of Local Government to Spatial Decision Support System (지자체 발전전략과 공간적 의사결정지원체계의 연계 방안 연구)

  • Park, Ji-Man;Hwang, Chul-Sue
    • Journal of the Korean association of regional geographers
    • /
    • v.15 no.5
    • /
    • pp.671-687
    • /
    • 2009
  • This paper aims to link the development strategy of a local government(Guri-si, Kyunggi-do) to a spatial decision support system that is in the early stages of implementation and testing. Spatial Decision for a local governmental authority typically involves multiple stakeholders. To any specific regional problem, stakeholders often have various levels of knowledge and experiences about it, that yield conflicting views. In this point of view, the enhanced access to information can bring the decision process to solve the problem throughout more public participation. Recently, Urban development study was required to improve the decision making of public participation form. This study aim to investigate an analysis local government of Guri-si, can be supported as the suggestion of decision making system. Guri-si has been argued that it would improve citizen's life quality intent theme 'by historical tourism in general dimension' promote region identity, environment friendly and transportational strength, by reflecting various plan of urban development and it executed strategy. There are increasing interest in citizen participation and practical using of policy decision making to respond to uncertain environment and systematic exploration of local government. Focused on the contents of public participation decision making, it is important to investigate how to analysis urban development strategy and geographic information relationship for useful. The paper concludes with a discussion of current issues encountered during development and implementation of spatial decision making(or support) system for the local administrative authority.

  • PDF

The Historical Understanding of the U. S. Secret Records Management (미국의 비밀기록관리체제에 대한 역사적 이해)

  • Lee, Kyong-Rae
    • The Korean Journal of Archival Studies
    • /
    • no.23
    • /
    • pp.257-297
    • /
    • 2010
  • The U. S. government has a long history to classify and manage governmental records which are created, collected, and preserved for itself. During the colonial period before the independence, the U. S. mostly practiced the maintenances of secret records and restrictions of access to the records following a long convention without any specific legal authority. Since establishment of the U. S. Constitution, the government had kept secret records on the basis of constitutional authority. However, the U. S. government began to take shape the secret records management system when it participated in the World War I, which required the system to reflect the needs in reality to manage drastic increases in important military and foreign relation documents. The World War II made the U. S. government strengthen its secret records management system, and its conception of secret records management system at that time has sustained until now. It can be said that the current secret records management system of the U. S. government continues to be managed by constitutional authorities and the executive orders which are opt to change. This article intends to review the secret records management system of the U. S. from the initial history of the U. S. to the Cold War. To understand its system of secret management, the paper investigates the U. S. secret records management history by dividing into three periods: the period of establishment of its tradition(the Colonial era~just before the WWI); the period of taking shape of its system (the WWI~the WWII); and the period of current conception of its system. The criteria of these divisions are created based on the differences of the laws relevant to the secret records and the application methods of secret management system in reality.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

A Study on the Choice of Main Entry in German Cataloging Rules; a comparison with the title entry in the Orient (독일목록규칙의 기본기입선정에 관한 연구)

  • Kim Tae-soo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.21
    • /
    • pp.61-101
    • /
    • 1991
  • This study reviews the development and change of main entry principle in German cataloging codes, with special emphasis on RAK. With rerard to the functions of catalog, comparison between the traditional title main entry in the Orient and author main entry in the West has been made. The analysis confirms in this study that various criteria in choice of the entries in RAK have been adopted. In case of works where the persons who have played different roles in the works are named on the title page, as well as related works and works of mixed responsibility, the criteria of entry determination are complex and time consuming process and have no absolute value. And there are also various kinds of problems in corporate entries including confirmation of originator(Urheber), choice of either the territorial authority corncerned or corporate bodies as an entry depending on the nature of the publications, and a unique bibliographical situation of treaties. This means the code is absence of absolute value in selecting entries, and this results in adoption of main entry principle which has lost its significance for the purpose of cataloging. With emergence of the ISBD and actualization of automated cataloging, morever, all entries are equal as points of access. It would eliminate the need for personal judgements required in choice of main entry by the present code. In doing so, it would bring uniformity and standardization to cataloging practice. In direct approach to works, title entry is more developed finding device than author entry in cataloging theories. Thus introduction of unit card system beginning with title which is adopted in KCR3 would be desirable, the complicated rules for the choice of entry could be abandoned from cataloging codes. Most of the user studies show that catalog users have placed higher value on the title entry as a finding device and each entry is equal as access points through unit entry. This means that choice of a given entry as a main entry is unnecessary in cataloging codes. Title entry would be a rather simple standard and direct approach for works. This study proves that the traditional title entry of Korea is superior to author main entry in the Western world in cataloging theory. Thus recommendation to be made is that abandonment of author main entry from cataloging codes should be considered in the future.

  • PDF

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

A Study on the System of Confidential Record Management of the USA (미국의 비밀기록관리제도에 관한 연구 -대통령의 행정명령(EO)을 중심으로-)

  • Kim, Geun Tae
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.159-206
    • /
    • 2019
  • This study aims to analyze the details of the executive order of the president of the United States, which have been developed in the country's administrative system to institutionalize the guarantee of the people's right to know the classified records, as well as to protecting national secrets. This study also aims to present any implications for the development of the classified record management system of Korea. To this end, the previously issued EO concerning the classified records management were reviewed in terms of its classification, safeguard, and declassification. The analysis results showed that the EO by the president established and prescribed the special access program for national secrets, the system to exempt and suspend the automatic declassification, and the sanctions for protecting national secrets. The EO also established and prescribed the appointment system for the person with the authority to classify record, automatic declassification program, and Mandatory declassification review system, as well as the procedures for historical researcher and certain former government personal to access the classified records with the purpose of guaranteeing people's right to know. As a result, this study identified implications for the development of Korea's classified record management system, as follows : First, it is necessary to restructure the current classified record management system, by changing the operations that is dependent on the director of the National Intelligence Service to the one that is dependent on the President. Second, it is necessary to legislate a separate special law for the classified record management system. Third, a standing supervisory body should be established for the integrated management and for the consistent and routine supervision of the classified record management. Fourth, it is necessary to establish procedures to further review the classification of classified record to correct the defects of the current classification system, which has been abused and mismanaged by the national agencies and organizations that produce classified record.

A Study on the Perception of University Librarians on Resource Description and Access (RDA에 대한 대학도서관 사서의 인식에 관한 연구)

  • Lee, Sung-Sook
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.455-477
    • /
    • 2022
  • The purpose of this study is to examine the perception of RDA by university library librarians and the level of perception of emotions, familiarity, understanding, introduction, obstacles, and education, and to secure basic data to improve awareness. The data needed for the study were obtained through a survey of 76 librarians in 4-year university libraries. As a result of the survey, 67.1% of librarians had listened to RDA, and school classes were the highest at 51.0% of cognitive means. Second, librarians perceived that they were more positive emotions than negative emotions about RDA, and that they were not familiar with RDA-related principles or concepts. In particular, it was recognized that the RDA itself and FRAD were not more familiar. The librarian recognized that they understood RDA-related principles or concepts at a normal level, and in particular, recognized that they did not further understand the authority and encoding. Third, librarians recognized the introduction of RDA at a slightly higher level than usual, but among the questions, 'RDA replaces AACR2' was recognized at a normal level. The librarian recognized the obstacles to the introduction of RDA at a higher level than usual, and in particular, the lack of education related to RDA was highly recognized. Fourth, librarians recognized the need for RDA-related education at a high level, especially the use of RDA Toolkit, changes in RDA records, differences between RDA and AACR2, and the need for RDA and MARC21-related education. In this study, based on the research results, a plan to improve librarian awareness of RDA was proposed.

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.22-33
    • /
    • 2009
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.